default search action
Gaurav Choudhary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Vincent Abella, Johnfil Initan, Jake Mark Perez, Philip Virgil Astillo, Luis Gerardo Cañete, Gaurav Choudhary:
Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation. Future Internet 16(8): 277 (2024) - [j19]Prabal Verma, Aditya Gupta, Ramraj Dangi, Gaurav Choudhary, Nicola Dragoni, Ilsun You:
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system. Int. J. Ad Hoc Ubiquitous Comput. 45(3): 186-199 (2024) - [j18]Ankur Pandey, Praveen Kumar Mannepalli, Manish Gupta, Ramraj Dangi, Gaurav Choudhary:
A Deep Learning-Based Hybrid CNN-LSTM Model for Location-Aware Web Service Recommendation. Neural Process. Lett. 56(5): 234 (2024) - [j17]Gaurav Choudhary, Dinesh Sethi:
HVDFusion: an effective fusion framework based on Hilbert vibration decomposition for multi-focal and multi-sensor images. Signal Image Video Process. 18(8-9): 6063-6079 (2024) - 2023
- [j16]Gaurav Choudhary, Dinesh Sethi:
Mathematical modeling and simulation of multi-focus image fusion techniques using the effect of image enhancement criteria: a systematic review and performance evaluation. Artif. Intell. Rev. 56(11): 13787-13839 (2023) - [j15]Sandi Rahmadika, Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, Vishal Sharma, Ilsun You:
Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices. IEEE J. Biomed. Health Informatics 27(2): 710-721 (2023) - [c15]Muhammad Usman, Emilio A. Mendiola, Tanmay Mukherjee, Rana Raza Mehdi, Jacques Ohayon, Prasanna G. Alluri, Sakthivel Sadayappan, Gaurav Choudhary, Reza Avazmohammadi:
On the Possibility of Estimating Myocardial Fiber Architecture from Cardiac Strains. FIMH 2023: 74-83 - [c14]Danmarl Butad, Steven Matthew Tao, Harlee Tudtud, Alvin Joseph Macapagal, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Fake Base Station Detection and Localization in 5G Network: A Proof of Concept. MobiSec 2023: 3-17 - 2022
- [j14]Gaurav Dave, Gaurav Choudhary, Vikas Sihag, Ilsun You, Kim-Kwang Raymond Choo:
Cyber security challenges in aviation communication, navigation, and surveillance. Comput. Secur. 112: 102516 (2022) - [j13]Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, Praveen Lalwani:
ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 14(4): 116 (2022) - [j12]Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragoni:
Emerging Cyber Security Challenges after COVID Pandemic: A Survey. J. Internet Serv. Inf. Secur. 12(2): 21-50 (2022) - [j11]Ramraj Dangi, Praveen Lalwani, Gaurav Choudhary, Ilsun You, Giovanni Pau:
Study and Investigation on 5G Technology: A Systematic Review. Sensors 22(1): 26 (2022) - [j10]Ramesh Velumani, Hariharasitaraman Sudalaimuthu, Gaurav Choudhary, Srinivasan Bama, Maranthiran Victor Jose, Nicola Dragoni:
Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Sensors 22(8): 2959 (2022) - [c13]Gaurav Pramod Kachare, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag:
Sandbox Environment for Real Time Malware Analysis of IoT Devices. COMS2 2022: 169-183 - [c12]Meeraj Mahendra Gawde, Gaurav Choudhary, Shishir Kumar Shandilya, Rizwan Ur Rahman, Hoonyong Park, Ilsun You:
Improvised Model for Blockchain in Distributed Cloud Environment. CSS 2022: 327-341 - [c11]Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni:
DyBAnd: Dynamic Behavior Based Android Malware Detection. MobiSec 2022: 209-219 - [c10]Mathew Del Castillo, Harvey Hermosa, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System. WISA 2022: 89-101 - 2021
- [j9]Vikas Sihag, Manu Vardhan, Pradeep Singh, Gaurav Choudhary, Seiil Son:
De-LADY: Deep learning based Android malware detection using Dynamic features. J. Internet Serv. Inf. Secur. 11(2): 34-45 (2021) - [j8]Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You:
TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System. IEEE J. Biomed. Health Informatics 25(10): 3763-3775 (2021) - [c9]Chirag Bhatt, Vikas Sihag, Gaurav Choudhary, Philip Virgil Astillo, Ilsun You:
A Multi-Controller Authentication approach for SDN. ICEIC 2021: 1-4 - [c8]Paresh Sajan Gharat, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag:
Future Applications of Blockchain in Education Sector: A Semantic Review. MobiSec 2021: 93-106 - [c7]Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh:
Forensic Analysis of Fitness Applications on Android. MobiSec 2021: 222-235 - [c6]Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, Ilsun You:
Fingerprint Defender: Defense Against Browser-Based User Tracking. MobiSec 2021: 236-247 - [c5]Pramod Borana, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh:
An Assistive Tool For Fileless Malware Detection. WAC 2021: 21-25 - 2020
- [j7]Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Trans. Netw. Serv. Manag. 17(4): 2496-2510 (2020)
2010 – 2019
- 2019
- [j6]Gaurav Choudhary, Vishal Sharma, Ilsun You:
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol. Comput. Electr. Eng. 74: 59-73 (2019) - [j5]Jiyoon Kim, Gaurav Choudhary, Jaejun Heo, Daniel Gerbi Duguma, Ilsun You:
5G wireless P2MP backhaul security protocol: an adaptive approach. EURASIP J. Wirel. Commun. Netw. 2019: 265 (2019) - [i6]Gaurav Choudhary, Jiyoon Kim, Vishal Sharma:
Security of 5G-Mobile Backhaul Networks: A Survey. CoRR abs/1906.11427 (2019) - [i5]Gaurav Choudhary, Vishal Sharma:
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks. CoRR abs/1909.08844 (2019) - 2018
- [j4]Vishal Sharma, Gaurav Choudhary, Yongho Ko, Ilsun You:
Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT). IEEE Access 6: 43368-43383 (2018) - [j3]Takshi Gupta, Gaurav Choudhary, Vishal Sharma:
A Survey on the Security of Pervasive Online Social Networks (POSNs). J. Internet Serv. Inf. Secur. 8(2): 48-86 (2018) - [j2]Gaurav Choudhary, Jiyoon Kim, Vishal Sharma:
Security of 5G-Mobile Backhaul Networks: A Survey. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 41-70 (2018) - [j1]Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, Jung-Taek Seo:
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System. Sensors 18(6): 1888 (2018) - [c4]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems. CHASE 2018: 88-93 - [c3]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. IWCMC 2018: 560-565 - [c2]Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. PRDC 2018: 189-190 - [i4]Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae-Deok Lim, Jeong-Nyeo Kim:
Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications. CoRR abs/1804.07204 (2018) - [i3]Takshi Gupta, Gaurav Choudhary, Vishal Sharma:
A Survey on the Security of Pervasive Online Social Networks (POSNs). CoRR abs/1806.07526 (2018) - [i2]Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho:
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey. CoRR abs/1807.00435 (2018) - [i1]Gaurav Choudhary, Vishal Sharma, Takshi Gupta, Jiyoon Kim, Ilsun You:
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives. CoRR abs/1808.00203 (2018) - 2012
- [c1]Asif Ekbal, Sriparna Saha, Gaurav Choudhary:
Plagiarism detection in text using Vector Space Model. HIS 2012: 366-371
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint